Online PC Support

OPS Technical Solutions : +1 833-522-1003

Welcome

How Microsoft Crowdsourced the Making of Office 2010

Microsoft conducted several programs including feedbacks from its users before and after their introduction of their Microsoft Office 2010. Their main aim was to make Microsoft Office the best to satisfy the customers.

It was Denise Carlevato, a 10 years experienced Microsoft usability engineer and her colleagues who conducted the program. They received the feedbacks from the selected 2 million users out of the 9 million users who downloaded the beta version of Microsoft Office 2010. Based on their feedbacks along with 600 participants who participated in Microsoft’s Virtual Research Lab, Carlevato came to a conclusion what the customers need and how their product was useful.

Microsoft which was predicted by many software engineers to lose its hold in the software field after the introduction of Smartphone and Apple iphone, proved them wrong by still being number 1 in the software field.

While it is said that Google Docs are the competitors for Microsoft Office, the truth is being not so. Reports show that around 67% of the American population is using Microsoft Office while only 4% of them use Google Docs even though it comes for free. Some of the researchers like the Fosters say that Google Docs is not to be considered as a competitor for Microsoft Office at all as Google Docs lags behind MS Office in terms of penetration and customer support.

Microsoft also set a separate database to review each of the Send A Smile feedback

In the beta version of Microsoft Office a “send a smile” comment box was added so that the users can add their comments regarding suggestions to improve it. It is said that nearly 81,000 people added their e-mail ids so they could follow up with the improvement done by the engineers. The Microsoft also set a separate database to review each of the Send A Smile feedback manually to consider what are the points to add to make Office better.

Regarding the Virtual lab testing, people were encouraged to participate and engage themselves in certain tasks provided by Microsoft. While they performed the tasks, Carlevato and her colleagues watched how they performed their task and obtained reviews from them. Carlevato states that the virtual lab experience helped them how long it took to perform a task and how easy it was.

Apart from the user’s feedbacks and virtual lab tests, Microsoft also worked with students directly. About 26 students of the University of Washington participated in the program while they tested on the Office Web Apps early version. They held meeting with engineers once in a fortnight to discuss about the features that impressed them and they further wanted.

According to P. J. Hough, corporate vice president of Office Program Management, it is not possible to make all the changes needed immediately in a big program like Office 2010. However he promises that Microsoft will be able to do all that is needed.

How do I Choose Which Games my Children Should Play

In today’s world, computer and internet are both considered as an integral part of our life, especially that of our children who spend most of their time playing the wide range of online games. As parents, everyone wishes to control the types of games that our kids play on the web. However, with the Parental Controls, it is very much possible today to keep a check on all the games that your kids play. You can easily block:

  • All types of games.
  • Particular games based on your choice.
  • Some games depending on their age ratings.
  • Particular games based on their content ratings.

However, you can also use these methods in varying combinations for your children. Here is a description on how you can use the Parental Controls feature for blocking the online games that our children play.

Blocking all types of games

  1. Click the start button and then the Control Panel. Click in the User Accounts and Family Safety section. Open the Parental Controls for the particular user. In case you are asked for a verification or administrator password, provide the needed details.
  2. Enter the person’s name that you wish to block from playing the online games.
  3. In the Parental Controls section, click ON, enforce current settings.
  4. Now click on Games.
  5. In the section, Can Person’s name play games? Click on NO.

Blocking games based on your choice

  1. Click the start button and then the Control Panel. Click in the User Accounts and Family Safety section. Open the Parental Controls for the particular user. In case you are asked for a verification or administrator password, provide the needed details.
  2. Enter the person’s name that you wish to block from playing the online games.
  3. In the Parental Controls section, click ON, enforce current settings.
  4. Now click on Games.
  5. In the section, Can Person’s name play games? Click the Yes option.
  6. In the Block/allow any game in your computer by name option, select either Block or allow for the specific games.
  7. Now find the particular game from the entire list of games arranged in an alphabetical order which you wish to block. Now select the Always Block option.

Blocking games depending on their age ratings

  1. Click the start button and then the Control Panel. Click in the User Accounts and Family Safety section. Open the Parental Controls for the particular user. In case you are asked for a verification or administrator password, provide the needed details.
  2. Enter the person’s name that you wish to block from playing the online games.
  3. In the Parental Controls section, click ON, enforce current settings.
  4. Now click on Games.
  5. In the section, Can Person’s name play games? Click the Yes option.
  6. Click Set game ratings in the Block/allow games by their rating and content types.
  7. In the Which ratings are OK for the person’s name to play section, Click the needed rating’s level.

How can I tell if my BIOS supports BitLocker Drive Encryption?

A complete disk encryption feature designed by Microsoft, the BitLocker Drive Encryption provides full protection to your data by providing an encryption for your important data. Well, if you wish to use this BitLocker Drive encryption system with your Trusted Platform Module (TPM) for securing your computer’s operating system drive, there are certain requirements that you should meet with. Well, most primarily it is extremely essential that your computer includes a well suited BIOS. If in case the BitLocker Drive encryption and the TPM system fail to work together with your BIOS and the TPM security hardware, then you should immediately contact your hardware manufacturer for the related troubleshooting details and its particular configuration.

The BitLocker Drive encryption also helps you by protecting the operating system drive of your computers without a suitable TPM based security hardware. However, in such cases, you being the user should insert the BitLocker start-up key into your computer using a flash drive. But, this should be done before you start your computer. How to activate the Bitlocker without the TPM security? Well, in order to make use of your BitLocker without the TPM security hardware, it is extremely essential that your computer BIOS supports the USB Flash drive processing in its initial startup process.

When you start up this BitLocker Drive encryption settings wizard in your computers operating system drive through the Windows Explorer or the Control Panel, by default the system checks for the most compatible TPM before it follows any step for enabling the BitLocker feature. However, in order to implement this exclusive feature in your computers without the appropriate TPM, you should first modify the current require additional authentication at startup Group Policy setting. Also, you should choose the Allow BitLocker option without selecting the check box for compatible TPM. As a result of this, the BitLocker Drive encryption system will then make use of the key information that is stored in your USB drive for encrypting all the content stored into the particular drive. Once the drive is properly encrypted based on this method, you should then insert your USB key into the computer every time it is started. This will help you to validate that you are authorized to access all the content stored in this protected drive.

However, if you are using the BitLocker Drive encryption on your computer for successfully running the Windows Server 2008 or perhaps the Windows Vista, you should also enable the desired require additional authentication at startup Group Policy setting. This is necessary for configuring the startup methods for all the computers. Also, when you enable the BitLocker for the first time and before the drive is encrypted, the Bitlocker feature setup wizard provides you the chance to check the availability of your USB flash drive in the initial starting process. In case the BIOS does not support the particular functionality, you will not be able to encrypt the desired drive. However, you can follow the other methods for protecting the content in your drive.

How Clear Up Unnecessary Files on Your Computer Quickly with Disk Cleanup

Knowing from personal experience, sometimes working on your computer can seem like wandering through an old neglected storeroom, filled with unused, outdated, space clogging things. If you are like me, then you do not like storing up countless megabytes of worthless junk on your computer. This article will guide you in how to delete your unused files and clean up your computer using Disk Cleanup.

About Disk Cleanup

Freeing up hard disk space can increase your computer’s performance speed and stability. Disk Cleanup frees up your hard disk space by:

  • Removing temporary files
  • Emptying you recycle bin
  • Removing system files that are not needed

Using Disk Cleanup

Follow these instructions to run Disk Cleanup.

  • Click Start and search Disk Cleanup. Click Disk Cleanup in the results.
  • Select the drive you wish to clean up, and then click OK.
  • Choose the files and file types you would like to delete and click OK.
  • Click on Delete files.

Advanced Cleaning

The following instructions will show you additional options for freeing up space in your hard disk. System files may be altered in this procedure so be sure that you do not need the files you indicate for deletion.

  • After running Disk Cleanup and selecting your preferred disk, click Clean up system files in the Disk Clean up dialogue box that appears. You may need administrator privileges for this.
  • Select the disk in which you want to run Disk Cleanup.
  • Choose the files and file types you would like to delete and click OK.
  • Click Delete files.

You can choose from additional options to free more space on your computer:

  • Select Program and Features if you would like to access the installed programs. You can use this utility to uninstall program that you do not need. You can check the size that each program takes up in the size column.
  • Recent restore points are used by your system to restore your computer to a previous state. These files normally accumulate when you install programs or when you create a backup copy of your current system settings.
  • Select System Restore and Shadow Copies to delete old restore points and unneeded backup files.

After running Disk Cleanup, you should have freed up a number of megabytes from your computer. Disposing of unneeded files will also increase the performance of your computer. It is like removing all of your unused papers off your work desk; you can now find the files that are important to you faster. Enjoy your cleaned up system!

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003